So my week in Dallas is finally winding down. Not that it hasn't been a great week, with interesting meetings with a number of the companies who reside astride the north Dallas Telecom corridor.

In the last two days I've spent time in the offices of Telstrat, NEI, NEC, Fujitsu, Texas Instruments, Excel, and Apptrigger; that's in addition to the executives I interviewed from a number of companies attending the Comptel show in Grapevine this week.

The interviews should be online shortly, to see if they've been posted, please visit the TMCnet video library.

I'll be following up with posts and articles about all the companies I met with, but in the meantime I wanted to share a bit of news from Sipera that's not made the rounds of the mainstream media just yet.

The company has just released an IP Video sniffer called UCSniff2.0. Until now, the information has only been posted on security boards and community sites, and on the SourceForge site at http://ucsniff.sourceforge.net/

The UCSniff2.0 eavesdrops, captures and records video conferencing sessions and works on regular IP Telephony too. Using the tool, an IT manager can perform a man in the middle voice capture and can reconstruct the voice call, shows holes in a security policy, and enable those responsible for a site's security to fix the application.

The timing is good, as many industry pundits are hailing 2009-10 as the timeframe when IP video comes into its own; the solution allows an IT manager to test their environment and move quickly to address issues.

Sipera also told me about VideoJak, an application designed to allow an IT manager to examine any vulnerabilities with regard to system availability.

VideoJak is an IP Video security assessment tool that can simulate a proof of concept DoS against a targeted, user-selected video session and IP video phone. VideoJak is the first of its kind security tool that analyzes video codec standards such as H.264. VideoJak works by first capturing the RTP port used in a video conversation and analyzing the RTP packets, collecting the RTP sequence numbers and timestamp values used between the phones. Then VideoJak creates a custom video payload by changing the sequence numbers and timestamp values used in the original RTP packets between the two phones. After the user selects a targeted phone to attack in an ongoing video session, VideoJak delivers the payload over the learned RTP port against the target. This attack results in severely degraded video and audio quality.

I want to thank Sipera VP of Marketing Adam Boone for spending some time with me and for walking me through the new apps.

Watch for more exciting stuff from this Richardson-based security firm in the coming weeks.